Security Services

on Monday, 24 December 2012.

Properly Deployed Security Technology, Policies, Procedures and Behavior Help Manage Risk

Security services can help you realize the value and benefits of manufacturing convergence and negate the impacts that can sometimes occur when systems are not properly designed or deployed.

The Network & Security Services is a converged team made up of manufacturing engineers and IT professionals. Our consultants collaborate with you to help manage the differences between manufacturing and IT enterprises and their associated risks. This can be done not only through technology, but policies, procedures and behavior — allowing you to achieve your production and business goals.

No matter where you are in your security lifecycle, Security Services can help improve system reliability and increase overall equipment effectiveness.

Assessments are the starting point of any security program implementation. An assessment can give you an idea of your current security posture and what it will take to get you where you need to be. Depending on your required end result, security assessments look at your situation from different perspectives from technology to policies, procedures and behavior.

At the end of any assessement, you will receive deliverable documents that will give you an understanding of the changes that will help you meet your end goal.

  • Policy Assessment — A policy assessment is conducted via interviews with your key personnel to identify vulnerabilities associated with existing security policies and procedures. To help you continuously improve overall security posture, the deliverable provides a gap analysis and recommendations for the current security program, short term goals to improve current architecture, a long term strategy to meet the intended security program purpose and an introduction to human-based security controls.
  • Design Assessment — A design assessment provides an infrastructure analysis by comparing your provided architecture design documentation to your existing security requirements, as well as industry standards. Your deliverable provides observations, issues and resolutions to help you achieve a network architecture design that meets your security needs.
  • Onsite Assessments — Onsite assessments offer a variety of analyses including how your system currently operates, what are your quantifiable risks and what are the associated vulnerabilities.
    • Operational: Assessment is an analysis of your manufacturing infrastructure including integration strategies with the business infrastructure. Your deliverable details the observed vulnerabilities, issues and resolutions.
    • Risk: Assessment helps identify your critical assets and their values, vulnerability and threats. Security Consultants will collaborate with you to quantify the probability and business impact to those threats and provide you with possible solutions and the cost of the countermeasure.
    • Vulnerability: Assessment will identify your system vulnerabilities. Your deliverable details the observed vulnerabilities, issues and resolutions.

Comments (0)

Leave a comment

You are commenting as guest.

COOPERATIONS